This article will focus on how organizations can utilize deception-based cyber intelligence in order to block adversaries and cyber attacks before that.